A) . To conduct a surprise raid B) . To immediately obtain a confession C) . To intimidate the suspect D) To gather accurate information and clarify facts
A) Leading questioning B) Rapid-fire questioning C) Cognitive interviewing D) Direct questioning
A) Covert surveillance B) Physical intimidation C) Forceful confrontation D) Reid technique
A) Their innocence B) The entire criminal act C) Only the elements of the crime D) Facts that may indicate involvement but not the full criminal liability
A) It must be voluntarily made B) It must be coerced under pressure C) It must be made in front of the media D) It must be made to any person
A) They are inadmissible unless a judge witnesses them B) They are admissible even without corroboration if the declarant believes death is imminent C) They are only valid if the declarant survives D) They must be notarized
A) . A statement made to the police immediately after arrest B) A confession made under duress C) . A statement that independently proves facts of the case D) A statement made to influence another witness
A) Note-taking B) Passive observation C) Open-ended narrative D) Polygraph testing
A) Intimidation by authorities B) Immediate police confrontation C) Presence of media witnesses D) Absence of threats, inducement, or coercion
A) Narrative B) Cognitive C) Structured D) Informal
A) The suspect must be informed of their rights B) It must be made knowingly and intelligently C) It must include a public apology D) . It must be voluntary
A) Conducting surveillance B) Gathering physical evidence C) Encouraging suspects to lie D) Using confrontation and behavioral analysis to elicit a confession
A) It was signed in front of police B) The declarant was aware death was imminent C) It was recorded on video D) It was written and notarized
A) Relies on threats to elicit statements B) Focuses on witness memory retrieval through context reinstatement C) Forces the suspect to provide a confession D) Is conducted without asking questions
A) Accept the statement at face value B) Ignore contradictions C) Verify the statement independently without coercion D) Use the statement only as hearsay
A) Rapid questioning B) Leading questions C) Confrontational interrogation D) Cognitive interviewing
A) Admissible in court B) Considered independent relevant statement C) Presumed involuntary and inadmissible D) Admissible in court
A) Obtain evidence through coercion B) Elicit the truth from a suspect C) Publicly shame the suspect D) Immediately arrest anyone nearby
A) Threatening the suspect with punishment B) Using physical pressure C) Advising the suspect of their right to remain silent D) Conducting the interrogation in private
A) Needs corroboration to be valid B) Requires police supervision C) Given only after a court order D) Made voluntarily and without prompting
A) Ask leading questions to force answers B) Interrupt the witness frequently C) Focus on irrelevant facts D) Listen actively and encourage detailed narratives
A) Direct confrontation B) Reid Technique C) Cognitive interviewing D) Passive observation
A) Voluntary nature B) . Recording of the confession C) Threats or promises made by law enforcement D) Knowledge of rights
A) An admission B) A dying declaration C) . A hearsay statement D) A voluntary confession
A) Was the door locked?” B) You didn’t hit anyone, right?” C) Did you see him take the money?” D) Can you describe everything that happened that day?”
A) . An acknowledgment of some facts that may establish a crime but stops short of full guilt B) Statement without any factual basis C) Complete confession of guilt D) Statement by a third party
A) Informational B) Cognitive C) Coercive D) Investigative
A) It is read aloud in court B) The declarant knew death was imminent C) The statement is notarized D) The statement is recorded immediately
A) Considered independent relevant statement B) Automatically valid C) Admissible D) Inadmissible due to coercion
A) Rapid-fire questioning B) Leading questions C) Confrontational interrogation D) Cognitive interviewing
A) Must involve a police officer B) Statement must be voluntary and independent of coercion C) Must be made publicly D) Must be repeated multiple times
A) Rule against hearsay B) Doctrine of independent evidence C) Principle of voluntariness D) Miranda rights
A) Friendly and neutral demeanor B) Ignoring witness responses C) Repeating questions rapidly D) Aggressive confrontation
A) Voluntary, knowing, and intelligent B) Coerced under threat C) Made without awareness of rights D) Given to a third party only
A) Ignore the timing of the statement B) Determine if the declarant believed death was imminent C) Treat it as hearsay by default D) Require the presence of legal counsel
A) Cognitive interviewing B) Leading questions C) Coercive interrogation D) Rapid questioning
A) Only if the declarant testifies B) Never C) Only if it is corroborated D) Even without the declarant being present
A) Admission is voluntary; confession is always coerced B) Admission is always false; confession is always true C) Admission acknowledges some facts; confession acknowledges full criminal responsibility D) Admission is given in court; confession is private
A) . They are inadmissible unless signed B) They require corroboration C) They must be witnessed by two officers D) They are exceptions to the hearsay rule
A) . It can identify deception or inconsistencies B) It forces a confession C) It substitutes for evidence D) It makes the suspect nervous
A) Leading question B) . Admission or confession C) Coerced statement D) Hearsay
A) Forced written confession B) Direct questioning with threats C) Behavioral analysis of the suspect’s story D) . Physical intimidation
A) Dying declaration B) Independent relevant statement C) Hearsay evidence D) Coerced confession
A) Voluntariness and knowledge of rights B) Speed of confession C) Presence of media D) Prior criminal record
A) Aggressive interrogation B) Random questions without structure C) Standardized questions asked in a pre-determined order D) Surprise questioning
A) Reid technique B) Cognitive interviewing C) Polygraph-assisted interview D) Public humiliation
A) Hearsay B) Full confession C) Coerced statement D) Admission
A) The belief that a person is unlikely to lie when facing imminent death B) The requirement for a judge’s approval C) The requirement for notarization D) The need for witnesses
A) Voluntary, informed, and without coercion B) Taken in a public forum C) Taken secretly with intimidation D) Taken after threats
A) Correlate statements with independent evidence for reliability B) Ignore inconsistencies C) Only record confessions, not admissions D) Accept statements at face value
A) Theft is committed only in commercial establishments; robbery is not B) Robbery requires prior consent of the victim; theft does not C) Theft involves intimidation; robbery does not D) Robbery involves violence or intimidation; theft does not
A) Killing a person to gain property B) Misappropriation or conversion of property through deceit C) Taking personal property by intimidation D) Breaking and entering a house
A) Interview witnesses only B) Forensic and medical examination with crime scene documentation C) ocus solely on recovering stolen property D) Only review surveillance footage
A) The value of the property B) Number of victims C) Presence of deceit or fraudulent intent D) Whether the property is movable or immovable
A) . Interviewing neighbors B) Establishing proof of deceit or misrepresentation C) Verifying the victim’s prior consent D) Checking fingerprints only
A) Seizing unrelated evidence in nearby areas B) Eyewitness identification and CCTV review C) Filing an administrative report D) In-depth financial profiling of the suspect
A) Only dwelling robbery requires victim testimony B) Public robbery requires prior planning; dwelling does not C) Robbery in a dwelling is punishable more severely due to violation of personal security D) Use of firearms is prohibited in dwelling robbery
A) Court-issued warrant or lawful seizure B) Consent from neighbors C) Public announcement D) Verbal permission from the suspect
A) Recovering the stolen item B) Proving motive C) Proving actual taking without consent D) Establishing prior criminal record
A) Physical evidence and witness statements P B) The social media accounts of neighbors C) Public opinion D) . The weather during the incident
A) Community service B) Imprisonment of 6 months C) Fine only D) Reclusion temporal to death
A) Kidnapping for ransom B) Theft of personal jewelry C) Breaking into a house D) Taking a motor vehicle with intent to gain
A) Verifying vehicle ownership and tracing its location B) Ignoring CCTV footage C) . Interviewing neighbors only D) . Filing a complaint with barangay officials
A) . Vehicle registration and plate number B) Public sentiment C) . Victim’s income record D) The suspect’s prior unrelated offenses
A) Location of the vehicle B) Number of suspects involved C) Use of physical harm or intimidation during the crime D) Type of vehicle used
A) Reviewing traffic camera footage and GPS tracking B) Forensic analysis of tire marks C) Seizing property in nearby towns D) nterviewing unrelated witnesses
A) Selling stolen goods knowingly B) Forgery of documents C) Theft of livestock only D) . Kidnapping for ransom
A) . R.A. 6539 B) . R.A. 9160 C) R.A. 9208 D) P.D. 1612
A) Reduce police workload B) Ensure the admissibility of recovered vehicle in court C) . Increase public awareness D) Protect suspect’s rights
A) Conducting surprise inspections only in schools B) Asking the media to report thefts C) . Surveillance and monitoring of known “hot spots D) Random public announcements
A) . Force, coercion, or deception for exploitation B) Theft of property C) Simple kidnapping without intent D) Illegal importation of goods
A) Private property owners B) Minors and women in trafficking-related sexual exploitation C) Bank account holders D) Vehicle owners
A) . Search unrelated areas B) Arrest suspects immediately without plan C) Ignore digital evidence D) . Locate and rescue victims safely
A) . Trace recruitment, transport, and exploitation stages B) . Focus solely on financial transactions C) . Ignore online communication records D) . Avoid interviewing victims
A) P.D. 1612 B) . R.A. 9160 C) . R.A. 9208 D) . R.A. 6539
A) Public announcements only B) . Coordinating with social welfare agencies and local authorities C) Filing reports without rescue operations D) . Ignoring forensic digital evidence
A) . Unusually large or frequent money transfers from unknown sources B) Owning a private vehicle C) Attending community events D) Small personal spending
A) Publicly disclosing personal data B) Monitoring unrelated social media C) . Ignoring online chats D) . Identifying recruiters, victims, and financial transactions
A) Financial fraud B) . Vehicle carnapping C) . Prevention of trafficking in persons, especially women and children D) . Only property theft
A) Ignoring financial evidence B) . Understanding and analyzing patterns of recruitment and exploitation C) Recording weather data D) . Memorizing names only
A) . Recovery – reporting to authorities B) Integration – using money for business investment C) . Placement – introducing illicit funds into the financial system D) Layering – separating illicit funds from origin
A) Layering B) Exploitation C) Integration D) Placement
A) Money appears legitimate for investment or business B) Money is stolen physically C) Assets are seized by authorities D) No financial movement occurs
A) . RA 9160 B) . RA 9208 C) . PD 1612 D) . RA 6539
A) Repeating reports B) Memorizing laws only C) Analyzing D) Remembering
A) . RA 9208 – Human Trafficking B) . RA 9160 – Anti-Money Laundering Act C) . RA 6539 – Anti-Carnapping D) RA 10364 – Expanded Anti-Rape
A) None of the above B) Recovery only C) . Placement and layering D) Integration only
A) Ignoring large transactions B) Customer Due Diligence (CDD) and reporting of suspicious transactions C) Random inspections of homes D) Asking media for information
A) Structuring transactions to avoid reporting requirements B) . Buying groceries with cash C) . Routine payroll deposits D) Small daily purchases
A) Confiscating property randomly B) Memorizing case files only C) Ignoring financial flows D) Tracing illicit money, linking to suspects, and analyzing transaction patterns
A) . Ignoring digital evidence B) Interviewing only neighbors C) Filing separate complaints without coordination D) Multi-agency coordination, evidence tracing, forensic and financial analysis
A) . Examine digital contracts, trace financial transfers, and interview parties involved B) . Only ask victims for statements C) Ignore electronic evidence D) Seize unrelated property
A) Only eyewitness statements B) . Only weather records C) . Random surveillance D) . Vehicle/asset registration, GPS tracking, financial transactions
A) Arresting without warrants B) Conducting public surveys C) Only recovering stolen property D) Following money trails, linking proceeds to suspects, and recovering property
A) . Filing reports without evidence B) Asking for public opinion C) Ability to analyze multiple crime patterns, link them to laws, and plan coordinated interventions D) Memorizing laws only
A) Interviewing unrelated parties B) Understanding recruitment, exploitation, and fund movement stages C) . Confiscating vehicles randomly D) . Ignoring financial records
A) . RA 6539 – Anti-Carnapping B) . PD 1612 – Anti-Fencing C) RPC – Theft provisions only D) . RA 9160 – AML
A) Only memorization of laws B) . Analytical skills to identify patterns, connections, and evidence chains C) Public speaking skills D) Writing press releases
A) . Media exposure ensures conviction B) Evidence must be legally obtained to ensure admissibility C) Public opinion can replace evidence D) Arrest without warrant is preferred
A) Only file reports B) Publicize the case C) Recover property, prosecute offenders, protect victims, and prevent recurrence D) Only arrest suspects |